
{"id":2555,"date":"2013-08-05T00:00:00","date_gmt":"2013-08-05T00:00:00","guid":{"rendered":"http:\/\/otava.test\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/"},"modified":"2013-08-05T00:00:00","modified_gmt":"2013-08-05T00:00:00","slug":"achieving-a-layered-data-security-solution-for-pci-dss-compliance","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/","title":{"rendered":"Achieving a Layered Data Security Solution for PCI DSS Compliance"},"content":{"rendered":"<p dir=\"ltr\">For ecommerce websites, partnering with a <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI DSS compliant hosting<\/a> provider can help you achieve many requirements of the standard while building a layered security solution to protect credit cardholder information, whether stored or merely in transit. Where should you start? [If you&#8217;re not sure what the requirements are, read\u00a0<em><a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/what-is-pci-compliance\/\">What is PCI Compliance?<\/a><\/em>]<\/p>\n<p dir=\"ltr\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Web Application Firewall\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/web-application-firewall.png\" alt=\"Web Application Firewall\" width=\"173\" height=\"173\" \/>For a fully protected system with multiple layers of technical security, start with a <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">web application firewall (WAF)<\/a>, a device that sits behind your virtual or dedicated firewall and scans any incoming traffic to web servers for potentially malicious attacks that might affect the web application server, including SQL injection attacks. Using a security tool to protect public-facing web applications is required by PCI DSS compliance requirement 6.6.<\/p>\n<p dir=\"ltr\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Two-Factor Authentication\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication.png\" alt=\"Two-Factor Authentication\" width=\"173\" height=\"173\" \/>Another way to protect against online fraud and unauthorized access to your Virtual Private Networks (VPN) when connecting remotely is <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">two-factor authentication<\/a>. Using a password and unique user ID in addition to a secondary factor (i.e., push notification on your smartphone) makes it more difficult for external intrusions to occur as a result of employing only one factor of authentication.<\/p>\n<p dir=\"ltr\">Two-factor satisfies requirement 8.3 that says companies must \u201cincorporate two-factor authentication for remote access (network-level access originating from outside the network) to the network by employees, administrators, and third parties.\u201d<\/p>\n<p dir=\"ltr\">Another method involves <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">vulnerability scanning<\/a> which is a web application that periodically checks your firewalls, networks and open ports for unsecure code or misconfigured networks. To meet PCI DSS compliance standard 11.2, you need to run vulnerability scans and produce quarterly reports of your system\u2019s security status.<\/p>\n<p dir=\"ltr\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" title=\"Vulnerability Scanning\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/vscan.png\" alt=\"Vulnerability Scanning\" width=\"578\" height=\"259\" \/><\/p>\n<p dir=\"ltr\">The standard also requires you to run scans after any significant change in the network, including installing new system components, changes in network, firewall rule modifications, product upgrades. etc.<\/p>\n<p dir=\"ltr\">Finally, <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/daily-log-review\">daily log review<\/a> fulfills PCI DSS requirement 10.6 that mandates log review for all system components on a daily basis. Log monitoring is not just the tracking, transportation and storage of log events, but it is also the review, analysis and monthly report of system activity.<\/p>\n<p dir=\"ltr\">For a full list of the technical security tools available to create a strong data security solution, visit <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">Technical Security<\/a>.<\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/web.otava.com\/pci-compliant-data-needs\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"PCI Compliant Hosting White Paper\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/download-pci.png\" alt=\"PCI Compliant Hosting White Paper\" width=\"251\" height=\"114\" \/><\/a>For more information about other ways to secure your servers, read about our\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">Technical Security services.<\/a><\/p>\n<p dir=\"ltr\">Or, if you\u2019re confused about how to meet technical security requirements of PCI DSS, read our PCI Compliant Hosting white paper. It discusses the impact of the PCI DSS standard on data centers and server infrastructure, describes the architecture of a\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/pci-compliant-data-centers\">PCI compliant data center<\/a>\u00a0both technically and contractually, and outlines the benefits and risks of data center outsourcing, and vendor selection criteria.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For ecommerce websites, partnering with a PCI DSS compliant hosting provider can help you achieve many requirements of the standard while building a layered security solution to protect credit cardholder information, whether stored or merely in transit. Where should you start? [If you&#8217;re not sure what the requirements are, read\u00a0What is PCI Compliance?] For a fully protected system with multiple layers of technical security, start with a web application firewall (WAF), a device that sits behind your virtual or dedicated firewall and scans any incoming traffic to web servers for potentially malicious attacks that might affect the web application server, including SQL injection attacks. Using a security tool to protect public-facing web applications is required by PCI DSS compliance requirement 6.6. Another way to protect against online fraud and unauthorized access to your Virtual Private Networks (VPN) when connecting remotely is two-factor authentication. Using a password and unique user ID in addition to a secondary factor (i.e., push notification on your smartphone) makes it more difficult for external intrusions to occur as a result of employing only one factor of authentication. Two-factor satisfies requirement 8.3 that says companies must \u201cincorporate two-factor authentication for remote access (network-level access originating from outside&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2555","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Achieving a Layered Data Security Solution for PCI DSS Compliance | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Achieving a Layered Data Security Solution for PCI DSS Compliance\" \/>\n<meta property=\"og:description\" content=\"For ecommerce websites, partnering with a PCI DSS compliant hosting provider can help you achieve many requirements of the standard while building a layered security solution to protect credit cardholder information, whether stored or merely in transit. Where should you start? [If you&#8217;re not sure what the requirements are, read\u00a0What is PCI Compliance?] For a fully protected system with multiple layers of technical security, start with a web application firewall (WAF), a device that sits behind your virtual or dedicated firewall and scans any incoming traffic to web servers for potentially malicious attacks that might affect the web application server, including SQL injection attacks. Using a security tool to protect public-facing web applications is required by PCI DSS compliance requirement 6.6. Another way to protect against online fraud and unauthorized access to your Virtual Private Networks (VPN) when connecting remotely is two-factor authentication. Using a password and unique user ID in addition to a secondary factor (i.e., push notification on your smartphone) makes it more difficult for external intrusions to occur as a result of employing only one factor of authentication. Two-factor satisfies requirement 8.3 that says companies must \u201cincorporate two-factor authentication for remote access (network-level access originating from outside...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-05T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/web-application-firewall.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Achieving a Layered Data Security Solution for PCI DSS Compliance\",\"datePublished\":\"2013-08-05T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/\"},\"wordCount\":444,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/web-application-firewall.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/\",\"url\":\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/\",\"name\":\"Achieving a Layered Data Security Solution for PCI DSS Compliance | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/web-application-firewall.png\",\"datePublished\":\"2013-08-05T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/web-application-firewall.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/web-application-firewall.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Achieving a Layered Data Security Solution for PCI DSS Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Achieving a Layered Data Security Solution for PCI DSS Compliance | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Achieving a Layered Data Security Solution for PCI DSS Compliance","og_description":"For ecommerce websites, partnering with a PCI DSS compliant hosting provider can help you achieve many requirements of the standard while building a layered security solution to protect credit cardholder information, whether stored or merely in transit. Where should you start? [If you&#8217;re not sure what the requirements are, read\u00a0What is PCI Compliance?] For a fully protected system with multiple layers of technical security, start with a web application firewall (WAF), a device that sits behind your virtual or dedicated firewall and scans any incoming traffic to web servers for potentially malicious attacks that might affect the web application server, including SQL injection attacks. Using a security tool to protect public-facing web applications is required by PCI DSS compliance requirement 6.6. Another way to protect against online fraud and unauthorized access to your Virtual Private Networks (VPN) when connecting remotely is two-factor authentication. Using a password and unique user ID in addition to a secondary factor (i.e., push notification on your smartphone) makes it more difficult for external intrusions to occur as a result of employing only one factor of authentication. Two-factor satisfies requirement 8.3 that says companies must \u201cincorporate two-factor authentication for remote access (network-level access originating from outside...","og_url":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/","og_site_name":"OTAVA","article_published_time":"2013-08-05T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/web-application-firewall.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Achieving a Layered Data Security Solution for PCI DSS Compliance","datePublished":"2013-08-05T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/"},"wordCount":444,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/web-application-firewall.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/","url":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/","name":"Achieving a Layered Data Security Solution for PCI DSS Compliance | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/web-application-firewall.png","datePublished":"2013-08-05T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/web-application-firewall.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/web-application-firewall.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/achieving-a-layered-data-security-solution-for-pci-dss-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Achieving a Layered Data Security Solution for PCI DSS Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2555"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2555\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2555"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}